Where results make sense
About us   |   Why use us?   |   Reviews   |   PR   |   Contact us  

Topic: Common User Access

Related Topics

In the News (Thu 25 Apr 19)

  The evolution of the Common User Access Workplace Model - Technical IBM Systems Journal - Find Articles
Discussed are the key architectural and design elements of the CUA Workplace Model, the fundamental shifts in computer-human interaction that have occurred since the first publication of the guidelines in 1987, and how user interface design, operating systems, and tools have interacted in the evolution of the guidelines.
User interface guidelines are intended to help product designers and developers create a user interface that users will find easy to learn and use.
The user interface design principles, models, and methods described in IBM CUA publications[1,2] are generally applicable to product-specific interface aspects as well.
www.findarticles.com /p/articles/mi_m0ISJ/is_n3_v31/ai_12547724   (867 words)

  Access - Wikipedia, the free encyclopedia
Access (law) is the standard international legal term for the right in parents to remain in contact with children of the family following relationship breakdown.
CJAL is an educational television station in Edmonton, Alberta branded as ACCESS, Alberta's provincial educational broadcasting service.
Access 5, is a national project sponsored by NASA
en.wikipedia.org /wiki/Access   (172 words)

 Problems and Challenges of the Graphical User Interface
The idea of Common User Access (CUA, IBM calls it) is good news for both sighted and blind users.
The blind user needs to be notified of spontaneous status messages or error messages that appear somewhere on the display; maybe the top, maybe the bottom, but certainly not where the user is currently focused.
Common user access is a big plus for the computing environment, and with access to the GUI, this advantage is shared by blind users.
www.rit.edu /~easi/easisem/thatcher.html   (2550 words)

 From User Access Patterns to Dynamic Hypertext Linking
User access logs are examined to discover clusters of users that exhibit similar information needs; e.g., users that access similar pages.
Pages in the matched categories that have not been explored by the user and are not adjacent to the user's current position may serve as navigational hints for the user to follow.
As a user may have different information goals each time he accesses a web site, we believe it is better to model user interests on a per session basis.
www.cs.ubc.ca /local/reading/proceedings/www5/www293/overview.htm   (4178 words)

 [No title]   (Site not responding. Last check: 2007-10-14)
When a user on a TAC port tries to open a connection, he or she will be prompted for a name and password.
Thus, access will be limited to users who have been entered into the user database by the responsible person of their organization.
Users who experience problems with using the network in general, and with terminal-to-TAC use, in particular, are encouraged to make use of this service.
www.rpi.edu /AFS/campus/doc/sri-rfc/ddn-news.n36.1   (1667 words)

 The user experience
A user model is typically described in terms of user objects, the behaviors and properties of those objects, and their interrelationships.
The difference is that OOP deals primarily with implementation aspects, while user models deal only with aspects that users are expected to experience through learning and use, such as the objects, or things, users employ to do their work.
The common user model consists of data and directories, represented as files and folders on a desktop, a clipboard along with cut/copy/paste actions, and programs, represented by Shortcuts and through data type associations.
www-106.ibm.com /developerworks/web/library/w-berry   (1817 words)

 Cool Solutions: Common User Access Provisioning Problems
Generally, setting up user provisioning is a difficult process, and troubleshooting can become a frustration if a step is missed.
Universal Password was developed to fix this problem, and it's suggested users incorporate this into their trees.
When this happens, users may not be able to provision, or they may be able to provision through HTTP depending on the certificate error.
www.novell.com /coolsolutions/tip/2333.html   (968 words)

 [No title]   (Site not responding. Last check: 2007-10-14)
Access to rich information sources in electronic form, ranging from the University's own data warehouse to materials for research and learning.
These resources, empowering the user through technology, should be available on as many desktops and for as many purposes as possible.
University data should be input to and accessible from a data warehouse, a systems environment for common user access to management information.
www.georgetown.edu /technology/taskforce/t3ndata2.htm   (564 words)

 Common User Agent Problems
User agents should allow users to retrieve and save these resources, otherwise users may not be able to access this Web content at all.
The user should be allowed to specify the set of languages that the user agent may use for language negotiation.
Wrong: User agents usually show the user (in the user interface) the URI that is the result of a temporary (302 or 307) redirect, as they would do for a permanent (301) redirect.
www.w3.org /TR/2003/NOTE-cuap-20030128   (3811 words)

 Common User Access—A consistent and usable human-computer interface for the SAA environments   (Site not responding. Last check: 2007-10-14)
The Common User Access (CUA) establishes a degree of standardization that is compatible with the differences in the three environments and that supports transfer of users experiences.
CUA is based on a user-interface architecture that identifies fundamental elements of structure.
CUA specifies user-interface components and guidelines to be used by application designers, and it provides a basis for programming development tool specifications.
domino.watson.ibm.com /tchjr/journalindex.nsf/0/7521b9eb651768a185256bfa00685bf2?OpenDocument   (146 words)

 Common Desktop Environment (CDE) Frequently Asked Questions FAQ
Common UNIX APIs - The Common APIs (Application Programming Interfaces) are the operating system interfaces that will be called "UNIX." A early name for this specification was Spec 1170, which is a reference to the number of APIs in the first draft of the specification.
Users will be guaranteed that their preferred solution will be available across platforms, but if users do not control all platforms that they must internetwork with, there will be incompatibilities at the interfaces between domains.
Users are notified when a new application is available on a server by additions (or deletions) to the list of icons in Application Manager window.
www.non.com /news.answers/cde-cose-faq.html   (10010 words)

 Identity Management Project Roadmap
User a periodic process to extract user data from each system, search for discrepancies, and respond either by applying corrections directly or by requesting authorization for change requests.
User access to the system must be encrypted (this typically means only HTTPS should be supported as a user interface).
An identity management system can report on user access rights across systems, and these reports can be given to management to verify appropriateness, with the result being reduced system privileges where they are not needed.
idsynch.com /docs/identity-management-project-roadmap.html   (4876 words)

 Mujo Web Designs Glossary of Terms
In this case, the server merely acts as a pathway between the end user and the stored data.
Common User Access — Abbreviated as CUA, a set standards for user interfaces developed by IBM.
CUA is one component of the System Application Architecture (SAA) standards introduced in 1987.
www.mujo.com /glossary.cfm?TermID=31   (721 words)

 User Interface Standards: How to Evaluate
User interface standards have become the object of increasingly intense activities in recent years [Abernethy 1988; Holdaway and Bevan 1989], including work in the International Standards Organization (ISO) [Brooke et al.
For a user interface standard to increase usability in the resulting products, two conditions have to be met: The standard must specify a usable interface, and the standard must be usable by developers so that they actually build the interface according to the specifications.
The two most common spurious deviations were the centering of the line listing the valid function keys (mentioned by 11) and the use of navigational abbreviations on the screens instead of full subsystem names (mentioned by 7).
www.useit.com /papers/standards.html   (4406 words)

 CUA: Common User Access    (Site not responding. Last check: 2007-10-14)
Common User Access (CUA) is a set of guidelines for the user interface to personal computer operating systems and computer programs, developed by IBM starting in 1987 as part of their Systems Application Architecture.
Used originally in the OS/2 and Microsoft Windows operating systems, parts of the CUA standard are now implemented in programs for other operating systems, including variants of Unix.
For example, in programs written to the CUA standard, help is always summoned by pressing the F1 function key.
www.javvin.com /softwareglossary/CUA.html   (123 words)

 Lotus Notes and Domino R6 Application Architecture for Exams 620, 621, and 622   (Site not responding. Last check: 2007-10-14)
Table 3.2 refers to some common user access conflicts that occur when users are assigned to more than one access level and their respective resolutions.
The access granted to the explicitly listed username takes precedence over the access granted in the group, even if the group access is higher.
The user is granted access of the group with the highest access.
www.informit.com /articles/article.asp?p=102643   (1375 words)

 6.1. Creating a shared folder
Each user can grant other users rights to any of his/her folders (we recommend careful consideration of this action — for example granting another user rights to the user's INBOX folder could have adverse implications).
User — a single user; specify the user name entry by a name or by a full email address of the user (depends on whether the user has an account in the domain or not).
Anonymous access — the folder can be mapped by any users, including those who have no account in Kerio MailServer (in such a case, special scripts are required to connect to the folder).
www.kerio.com /manual/beta/kwm/en/ch06s01.html   (484 words)

 The designer's model of the CUA workplace - Common User Access - Technical IBM Systems Journal - Find Articles
The Workplace Model is described as an object-oriented user interface where objects represented by icons are manipulated by selection and movement, copying and creating of other objects, and by defining their behavior to accomplish the user's desired task.
Whether the model is a plastic replica of an airplane, an exploded-parts diagram in a book, or an elaborate computer simulation model, the purpose of the model is to convey an understanding of the components that make up an object or a system and their interrelationships.
A user interface designer's job is to create a designer's model, or blueprint, of the user interface, just as an architect creates a blueprint of a house.
www.findarticles.com /p/articles/mi_m0ISJ/is_n3_v31/ai_12547726   (885 words)

 New OWL Classes for Windows 95 Common Control   (Site not responding. Last check: 2007-10-14)
The "common" in "common controls" means just that.
CUA (common user access) has long been an integral part of Windows programming and design.
For an example of some common Windows controls in a true Windows 95 application see Explorer in which TreeViews are used to present a hierarchical view of subdirectories and a ListView is used to present four different views of the files.
www.xploiter.com /programming/c/borland/3030.html   (589 words)

 Common User Agent Problems
Ensure that any non-text message to the user has a text equivalent; text may be rendered as visually displayed text, synthesized speech, and braille.
The user agent should notify the user that the document is incomplete.
In case the user does not specify any language, the user agent may use the language of its user interface as the value sent out.
www.w3.org /TR/2001/NOTE-cuap-20010206   (2996 words)

 Section 508 For Software Development
The extended color and highlighting options are included in the Common User Access (CUA) guidelines
Although the use of the extended attributes can provide an application with additional features that conform to Section 508, extended attributes work only if the terminal accepts the extended attributes (which is not always the case).
Common User Access SAA (System Application Architecture) specifications for user interfaces, including character-based formats of 3270 terminals.
www.section508.gov /IRSCourse/mod02/020102a2.html   (197 words)

 CUA - Calendar User Agent, Common Used Acronym, Common User Access, Common User Application
CUA is a acronym that can contains many meanings which are listed below.
There may be many popular meanings for CUA with the most popular definition being that of Calendar User Agent, Common Used Acronym, Common User Access, Common User Application
Security Audit access code for Friday, April 06, 2007 is jeToeVjtcb.
www.auditmypc.com /acronym/CUA.asp   (248 words)

 Common User Administration
In order to manage user accounts, you need to switch to Chalk and Wire's Common User Administration service, available only to those with an administrator account.
Users - Manage user accounts; reset passwords; search for users by category or name.
Users Profile- Adjust details that are held on a person.
www.chalkandwire.com /rmguide/CUAhome.html   (254 words)

 Delivering expected value to users and stakeholders with User Engineering - Author Bios
He is a co-developer of a method for designing user interfaces by employing software engineering disciplines and tools and is author of a book describing the method.
Her activities involve evolving user object-oriented design methodologies for use in Web design, working with internal IBM teams on specific ease-of-use activities, application of design skills to new product needs, and contributing to the published works of the Ease of Use group.
With the advent of end user computing, he played a key role in launching IBM's international time-sharing service in Europe and was later responsible for the UK Time Sharing service, as well as the development of associated system and application software for worldwide use.
www.research.ibm.com /journal/sj/424/berryaut.html   (625 words)

 HUL/Access Common Access Management
Access management for network-accessible resources encompasses serveral steps: user authentication, user profiling, and resource-specific access protocols.
Privileges are generally assigned on the basis of a user profile, which provides a set of characteristics associated with an authenticated identity.
They must recognize attempts at access without valid session credentials (cookie, session ID, etc., required by the gateway to maintain session state), and in such cases, redirect to a URL parameterized with the gateway identifier and, optionally, a specific resource identifier.
hul.harvard.edu /ldi/resources/hulaccess.html   (1487 words)

 JCCC::Credit Course Descriptions
Upon completion of this course, students should be able to demonstrate applications in the graphical user interface (GUI) programming language and use the appropriate GUI library.
The common user access (CUA) standards of GUI programming will be used throughout the course.
It is strongly recommended that students be familiar with common user programs that run under the chosen operating system (Windows, OS/2, X-Windows) before taking this course.
www.johnco.cc.ks.us /home/catalog/fall-2004/creditclasses/CIS269   (136 words)

 Suggested Readings in Human-Computer Interaction (HCI), User Interface (UI) Development, & Human Factors (HF) :
Although it is a survey of user interface development, it can also be used as a guide for practitioners.
Although the information is difficult to apply directly to user interface development (say, compared to a good GUI styleguide), a better understanding of the human side of the interface (the user in the user interface), human capabilities and limitations, is useful to understand why design choices are made, and how to make better choices.
Perhaps the most popular human factors text, but with little material for user interface developers, because the covered technology is about 10 years behind the publication date.
www.hcibib.org /readings.html   (2297 words)

 Motif - a Whatis.com definition   (Site not responding. Last check: 2007-10-14)
As such, it defines the rules and tools for the "look-and-feel" in the graphical user interface of most Unix-based operating systems and their applications.
The Motif Toolkit, also known as "Xm," ensures consistency with the Motif guideline and is used with the X Toolkit Intrinsics ("Xt").
Motif is the base graphical user interface toolkit for the Open Group's Common Desktop Environment (CDE).
whatis.techtarget.com /definition/0,,sid9_gci212595,00.html   (259 words)

Try your search on: Qwika (all wikis)

  About us   |   Why use us?   |   Reviews   |   Press   |   Contact us  
Copyright © 2005-2007 www.factbites.com Usage implies agreement with terms.